Presentation Title
Abstract
Infiltrating Cloud Storage of IoT devices using Ransomware
Anna Millerhagen
Computer science Department
Advisor: Eric Wright
Security is necessary for all areas of computer science. The expanding world of IT is IoT devices. There are many smart devices in our daily lives such as smart speakers, smart light bulbs, smart watches, doorbell cams, security systems, smart smoke alarms, smart cars, and many more. The need for security in these devices is critical. Any one of these devices could be the weak link to a security breach. These devices are all enabled and communicate through cloud services. They interact with various devices from different vendors all operating to provide the user with the best possible experience. The cloud authentication between devices could lead to a possible inflatable vulnerability. This paper explores the possible weakness and seeks to exploit them to understand the how to better prevent the attacks in the future. The aim of this paper is to infiltrate a device with known security weaknesses and access the cloud through the weak device. Then the final process would be to access a more secure device that holds more user data through the previously infiltrated cloud. This process proved unsuccessful.
College
College of Science & Engineering
Department
Computer Science
Breakout Room
21
Start Date
4-14-2021 3:00 PM
End Date
4-14-2021 3:45 PM
Presentation Type
Video (Live-Zoom)
Infiltrating Cloud Storage of IoT devices using Ransomware
Infiltrating Cloud Storage of IoT devices using Ransomware
Anna Millerhagen
Computer science Department
Advisor: Eric Wright
Security is necessary for all areas of computer science. The expanding world of IT is IoT devices. There are many smart devices in our daily lives such as smart speakers, smart light bulbs, smart watches, doorbell cams, security systems, smart smoke alarms, smart cars, and many more. The need for security in these devices is critical. Any one of these devices could be the weak link to a security breach. These devices are all enabled and communicate through cloud services. They interact with various devices from different vendors all operating to provide the user with the best possible experience. The cloud authentication between devices could lead to a possible inflatable vulnerability. This paper explores the possible weakness and seeks to exploit them to understand the how to better prevent the attacks in the future. The aim of this paper is to infiltrate a device with known security weaknesses and access the cloud through the weak device. Then the final process would be to access a more secure device that holds more user data through the previously infiltrated cloud. This process proved unsuccessful.